Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks

W Li, W Meng, Y Wang, LF Kwok… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
To enhance the detection capability of a single intrusion detection system (IDS),
collaborative intrusion detection networks (CIDNs) have been exploited and developed via …

Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods

C Callegari, S Giordano… - International Journal of …, 2012 - inderscienceonline.com
In the last years, the ever increasing number of network attacks has brought the research
attention to the design and development of effective anomaly detection systems. To this aim …

EnergyCIDN: Enhanced energy-aware challenge-based collaborative intrusion detection in internet of things

W Li, P Rosenberg, M Glisby, M Han - International Conference on …, 2022 - Springer
With cyber attacks becoming more complex and advanced, a separate intrusion detection
system (IDS) is believed to be insufficient for protecting the whole computer networks. Thus …

Secure and reliable routing in cognitive radio networks

KJ Prasanna Venkatesan, V Vijayarangan - Wireless Networks, 2017 - Springer
Due to the mobility of node and different spectrum availability pattern, CR networks are
frequently divided into unpredictable partitions. Usually, these partitions are irregularly …

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

D Madsen, W Li, W Meng, Y Wang - … 15-17, 2018, Proceedings, Part IV 18, 2018 - Springer
Cyber attacks are greatly expanding in both size and complexity. To handle this issue,
research has been focused on collaborative intrusion detection networks (CIDNs), which …

[HTML][HTML] Bridging the gap among actor–sensor–actor communication through load balancing multi-path routing

J Long, C Gao, S He, X Liu, A Liu - EURASIP Journal on Wireless …, 2015 - Springer
Wireless sensor actor networks (WSANs) consist of a large amount of sensor nodes with low
cost and little actor nodes with better processing capabilities. The actor nodes tend to get …

Towards continuous cloud service assurance for critical infrastructure it

A Hudic, T Hecht, M Tauber, A Mauthe… - … Conference on Future …, 2014 - ieeexplore.ieee.org
The momentum behind Cloud Computing has revolutionized how ICT services are provided,
adopted and delivered. Features such as high scalability, fast provisioning, on demand …

A novel framework for network traffic classification using unknown flow detection

ZA Shaikh, DG Harkut - 2015 Fifth International conference on …, 2015 - ieeexplore.ieee.org
The overall goal of any organization or enterprise is to ensure optimum use of the available
network resources in supporting the attainment of the operations and hence its strategic …

Research on routing protocol facing to signal conflicting in link quality guaranteed WSN

J Zhu, J Liu, Z Hai, B Yuan-Guo - Wireless Networks, 2016 - Springer
Wireless sensor networks (WSN), as a new type of environment monitoring system, has
became a hot research topic in recent years. This paper mainly focuses on the problem of …

Quantitative threat situation assessment based on alert verification

R Xi, X Yun, Z Hao, Y Zhang - Security and Communication …, 2016 - Wiley Online Library
Traditional network threat situational assessment is based on raw alerts, not combined with
contextual information, which influences the accuracy of assessment. In this paper, we …